Point, click, root: System exploitation with open tools

Posted by Scott_Ruecker on Sep 20, 2006 6:04 PM EDT
Linux.com; By Shawn Hermans
Mail this story
Print this story

IT managers face a problem determining what products and policies are best to properly secure their network. The problem with many security products is that it is hard to validate their claims. Penetration testing is a process for testing the security of networks by imitating an attacker.

Full Story

  Nav
» Read more about: Story Type: News Story

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.